ComputerWeekly.com Research Library

Powered by Bitpipe.com

Web Application Security Research

  • The Essential Guide To Secure Web Gateway

    Sponsored by: AT&T Cybersecurity

    Download this white paper to better understand the secure web gateway and its place within your security stack.

  • The Forrester Wave™: DDoS Mitigation Solutions, Q1 2021

    Sponsored by: Cloudflare

    According to Forrester’s 2021 research, DDoS protection customers should be looking for providers that: protect cloud assets, can defend layer 7 without a WAF, and automate – not just detect, but respond. Download the full Forrester Wave report to see how vendors in the DDoS protection space such as Cloudflare, Akamai, Radware stack up.

  • Frost Radar™: Global Holistic Web Protection Market, 2020

    Sponsored by: Cloudflare

    In this Frost & Sullivan report, take a look at where the Holistic Web Protection market is going and where different vendors stack up in terms of growth and innovation.

  • The Forrester Wave: DDoS Mitigation Solutions, Q1 2021

    Sponsored by: Cloudflare

    According to Forrester’s 2021 research, DDoS protection customers should be looking for providers that: protect cloud assets, can defend layer 7 without a WAF, and automate – not just detect, but respond. Download the full Forrester Wave report to see how vendors in the DDoS protection space such as Cloudflare, Akamai, Radware stack up.

  • 5 Critical Mistakes When Evaluating A Nextgeneration Firewall

    Sponsored by: Palo Alto Networks

    Download this e-book for 5 critical mistakes when evaluating a next-generation firewall.

  • Security Observability: Why Tracing?

    Sponsored by: Traceable

    Cyberattacks can cost affected organizations as much as $13 million per year. What if you could reduce the time to detect a cyberattack all the way down to zero? How much could you save by detecting and stopping an attack while it’s still happening? Leverage this white paper to learn the 4 pillars of security observability.

  • Why Web App Firewalls Aren’t Protecting Your Cloud-Native Apps

    Sponsored by: Traceable

    Take a look at what NG-WAFs do well, what they struggle with, and whether a solution makes up for their gaps.

  • Understand the OWASP Top 10 & How WAFs Can Mitigate Them

    Sponsored by: Radware

    Since 2003, the Open Web Application Security Project (OWASP) has put together a list of the top 10 security vulnerabilities posing the biggest risk to organizations. Access this e-book to see the current list and discover how web application firewalls (WAFs) can manage these vulnerabilities head-on.

  • Application Security Stats Flash

    Sponsored by: WhiteHat Security

    API-based applications are more at risk than ever before. As such, there is a critical need for a frequent and periodic analysis of the state of application security. Use this report, AppSec Stats Flash by WhiteHat security, to explore biggest windows of exposure by industry, the most prominent security vulnerabilities and average time-to-fix.

  • THE TRUE COST OF A DDoS ATTACK

    Sponsored by: Radware

    Many executives make the mistake of viewing cybersecurity strictly as a cost center. Organizations must reevaluate how the balance investment vs. risk equation and alter how and when they implement cybersecurity. In this Radware guide, learn the true cost of a DDoS attack, and see why it makes sense to invest now, not pay later.

  • Protecting APIs and Securing Applications So Business Can Thrive

    Sponsored by: Radware

    Nearly every organization relies on applications to connect with customers, business partners, suppliers and staff. As a result, the application and API threat landscape has evolved dramatically. Read this research report for a closer look at the state of application and API security, including top threats, best practices and more.

  • The Technology Behind Radware Bot Manager for APIs

    Sponsored by: Radware

    APIs are seeing massive adoption, and organizations are discovering ways to secure them from potential intrusion and exploitation. One of the most prominent API threats is ‘bad bots,’ and they’ve seen a 30% increase in the past year. To learn how you can protect from automated attacks targeting APIs, get stuck into this white paper by Radware.

  • Bridge your Executive Team

    Sponsored by: WhiteHat Security

    Application security is becoming increasingly important as applications play a more prominent role in driving today’s economy. Watch this webinar to learn more about the current state of AppSec, the challenges security teams are facing and how to get executive buy-in for AppSec initiatives.

  • Are Your Apps in the Race to Win?

    Sponsored by: WhiteHat Security

    For modern organizations, applications play a prominent role in both internal operations and interacting with end-users. As a result, application security has become critical. Watch this webinar to learn more about AppSec and why it’s critical for digital transformation initiatives.

  • Whitehat Security Webinar

    Sponsored by: WhiteHat Security

    Dynamic Application Security Testing (DAST) enables AppSec teams with the ability to assess and address the actual risk of their applications – providing critical security capabilities to support DevSecOps initiatives. Watch this webinar to learn more about DAST and how it can support your AppSec goals.

  • Enable and Educate Your Team

    Sponsored by: WhiteHat Security

    Too many cyberattacks come from subpar employee enablement and/or security misconfigurations. WhiteHat is looking to resolve this issue with their eLearning Platform, designed to educate your users on common application security threats, best practices, incident remediation, and more – read on to learn more about the platform.

  • SIG - Have you outgrown your traditional secure web gateway?

    Sponsored by: Cisco Umbrella

    Secure web gateways (SWGs) are deployed at most organizations – however, a vast majority of users (>90%) are unsatisfied with their current SWG solution. This e-book provides a closer look at the shortcomings of traditional SWG tools and explores the features and capabilities of Cisco’s modern, cloud-based SWG – read on to learn more.

  • Does your AppSec Program Gen An A+?

    Sponsored by: WhiteHat Security

    Applications are critical to an organization’s ability to communicate internally as well as with end-users or other third parties. As a result, apps are a quickly becoming a prime target for cybercriminals. Watch this webinar to learn more about the AppSec landscape, including what the common threats are and where pressure is rising.

  • Security in the Fast Lane

    Sponsored by: WhiteHat Security

    Today’s organizations rely on a collection of applications in order to maintain internal operations and interact with end-users. However, dangerous threats targeting data in these critical apps have emerged. Watch this webinar to learn more about the application security threat landscape, notable breaches and how to protect your apps.

  • Cybersecurity: It's a Team Sport

    Sponsored by: WhiteHat Security

    During the pandemic, cybercrime has quadrupled, leaving many organizations scrambling to strengthen their security posture. In this webinar, learn why it’s more important than ever for vendors, partners and customers to work together and build a true cybersecurity team to combat the evolving threat landscape.

  • How a Northeastern State Strengthened Application Security for their Voter Registration System

    Sponsored by: WhiteHat Security

    Elections are very heavily targeted by threat actors. Troublemakers as they are, these actors will go to great lengths to breach voter privacy, even by accessing user information to impersonate voters. One state recognized this and wanted to ensure the security of their voter registration apps. See this case study to learn how they did it.

  • The State of Election Security

    Sponsored by: WhiteHat Security

    The topics of voter registration and election security were top-of-mind in 2020 – but what did we learn that we can use to better ourselves going forward? Watch this webinar, which overviews the state of election security, common threats, and best practices.

  • DDoS Response Guide

    Sponsored by: Radware

    DDoS attacks can flood your network with malicious traffic, bringing applications down and preventing legitimate users from accessing your services. The good news, however, is that there is plenty to be done about it. In this white paper, explore 3 steps that will allow you to minimize the impact of a DDoS attack.

  • Addressing Complexity and Expertise in Application Security Testing

    Sponsored by: WhiteHat Security

    The Verizon’s 2020 DBIR indicated that 43% of data breaches begin by targeting a web application. This discovery has begun to shift the cybersecurity paradigm from focusing on on-premise infrastructures to protecting their web apps with application security testing (AST). Read this 451 Research brief to learn more about AST.

  • How a Top Financial Firm Scaled Their Application Security Program & Accelerated Their Digital Transformation

    Sponsored by: WhiteHat Security

    A top 10 U.S. bank was faced with the challenges of scaling application security automation, regulatory compliance and triaging false positives from an automated scanner. And after factoring in time and budget constraints, it’s clear that this was a tall mountain to climb. Read this case study to see how they reached the top.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences